Cryptography GPGTools on the Mac is now paid software |
- GPGTools on the Mac is now paid software
- Cloudflare Embraces Google Roughtime, simplifying certificate expiration checks
- RFC: naive encryption?
- How does constant inputs affect SAT formulation of a problem?
- I made an encrypting text editor for Windows. Any expert care to review the code?
- Comments on FINALCRYPT ?
GPGTools on the Mac is now paid software Posted: 22 Sep 2018 02:36 AM PDT |
Cloudflare Embraces Google Roughtime, simplifying certificate expiration checks Posted: 21 Sep 2018 06:34 AM PDT |
Posted: 21 Sep 2018 10:00 PM PDT so, i thought up this encryption algorithm a bit ago and been trying to think through ways to crack it, the code will follow, it's perhaps a bit naive and obviously it's has a weakness in that it relies on password, which are notoriously weak...but given a strong password..i think it should be strong... code: if you press f12 and paste that into the console it should produce a ciphertext, put the same ciphertext in for the text in the prompt with the same password it should produce the clear text. basically what is happening here is just i take every letter of the cleartext and xor it with a random character, the random character is derived from a pseudorandom number generator using a hash of the password as a seed. i can't speak to the effectiveness of the hash generator, or the random number generator, in this particular implementation (gonna be making an implementation in C using sha1 for the hash and that whatever RNG i can find that will accept a seed that big and still produce good pseudorandom numbers, then i will compile that to webassembly and use it for the encryption and decryption) my main thing is...i feel like i'm probably overlooking something critical and just don't know enough on the subject to know what i don't know. the ciphertext and the cleartext will be the same length...i don't know if there is some kinda attack that opens it up to...it shouldn't be weak to frequency analysis since every letter is xored with a random character...it doesn't matter how many times the letter e shows up, for instance, each occurrence is a difference ciphertext. what about known text...hmm... so, let's see i have the cleartext of "foobar" and a password of "foobar" and a ciphertext of 0xfe26c3dc6a93..if i didn't know the password, knowing the cleartext and the ciphertext...i can't think how i can workout the password...it's a hash of the password so one wrong letter changes the whole thing, the cleartext is xored with a random character..i'm not even sure i can work out the random characters i xored it with..well probably...i know an xor was done..but i can't just flip my bits..it's an xor not a NOT..and even knowing random characters and the cleartext wouldn't give me anything i can use to derive the password (which i might be able to use to crack other ciphertexts) since you can't derive the seed from the pseudo-random characters it produces. but maybe the folks here would be better versed in these things to give comments on the suitability and strength of this particular encryption technique? [link] [comments] |
How does constant inputs affect SAT formulation of a problem? Posted: 21 Sep 2018 11:35 AM PDT Lets say I have a black box circuit with N inputs and 1 output. I want to fix the value of M inputs (M<N) and find the value of rest of the inputs (N-M) for which the circuit is satisfiable. If I manually fix the M inputs in the verilog RTL, and convert it to CNF (using abc), will this yield the correct result? Is it the right approach to this kind of problem? I'm just starting on this so any help will be appreciated. Thanks! [link] [comments] |
I made an encrypting text editor for Windows. Any expert care to review the code? Posted: 21 Sep 2018 09:22 AM PDT The editor has Notepad-like interface and functionalities, but prompts the user for a passphrase before saving or opening a file. The encryption function uses PBKDF2 to derive a 256 bit key for AES and uses a random IV that is then stored with the file. The source code is on GitHub: https://github.com/m4ff/Cipherpad. [link] [comments] |
Posted: 21 Sep 2018 06:43 AM PDT https://www.wilderssecurity.com/threads/finalcrypt-file-encryption-program.402346/ Hi, this seems like a back-and-forth ping-pong game. Does anyone having due competences in cryptography could tell whether this app is safer or better than veracrypt ? [link] [comments] |
You are subscribed to email updates from Cryptography news and discussions. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment